The fixlookupid function in sealert in setroubleshoot before 3.2.23 allows local users to execute arbitrary commands as root by triggering an SELinux denial with a crafted file name, related to executing external commands with the commands.getstatusoutput function.
{
"unresolved_ranges": [
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
],
"vendor_product": "redhat:enterprise_linux_desktop",
"source": "CPE_FIELD"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
],
"vendor_product": "redhat:enterprise_linux_hpc_node",
"source": "CPE_FIELD"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
],
"vendor_product": "redhat:enterprise_linux_server",
"source": "CPE_FIELD"
},
{
"cpes": [
"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"last_affected": "7.0"
}
],
"vendor_product": "redhat:enterprise_linux_workstation",
"source": "CPE_FIELD"
}
]
}